I was working an issue with ipv6 routing and had to generated a tac report ( cli cmd execute tac report ) and the output had no ipv6 routes details.
Fortinet typically does good with most of the features pertaining to ipv6 , but they totally struck out on this one.
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Thursday, March 12, 2015
JunOS 12.3x48 rls is out
I'm in the process of downloading and reviewing the rls notes for this firmware.
And the only new feature that seemed of interest to me was VRRPv3 and Ipv6 transparent mode. The latter will be quite interesting to see what and how a SRX mid-range platform works
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
And the only new feature that seemed of interest to me was VRRPv3 and Ipv6 transparent mode. The latter will be quite interesting to see what and how a SRX mid-range platform works
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Monday, March 9, 2015
Playing the IOS "shell" game
Cisco IOS has started to provide a limit shell like functions with in the IOS code. This allows you to use simple unix shell commands suchs as; wc, grep, more, tail, sleep,etc....
Here's a few example, but 1st you have to execute the shell process via your terminal command
e.g
terminal shell
How about setting a variable
A simple word count of our config file
More examples;
You have a host of options for deploying the IOS shell in your scripts or day to day uses.
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Here's a few example, but 1st you have to execute the shell process via your terminal command
e.g
terminal shell
How about setting a variable
A simple word count of our config fileMore examples;
You have a host of options for deploying the IOS shell in your scripts or day to day uses.
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
HOWTO set a cisco ASA firewall policy in a inactive state
When working with policies on the cisco ASA firewall, you sometimes needs to disable a fwpolicy. This beats setting up a denial or removing the policy.
The easiest way to take a policy and is to change the status to inactive to accomplish a disable state. The policy will still be install but will not match or deny.
e.g
access-list EXTERNAL-in extended permit udp host 1.1.1.1 object RAD01 eq 1812
and now;
access-list EXTERNAL-in extended permit udp host 1.1.1.1.1 object RAD01 eq 1812 inactive
This is the easiest method for ensuring the firewall policy will not be enabled.
You might want to run packet-tracer to ensure that no other configure firewall acl is allowing traffic
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
The easiest way to take a policy and is to change the status to inactive to accomplish a disable state. The policy will still be install but will not match or deny.
e.g
access-list EXTERNAL-in extended permit udp host 1.1.1.1 object RAD01 eq 1812
and now;
access-list EXTERNAL-in extended permit udp host 1.1.1.1.1 object RAD01 eq 1812 inactive
This is the easiest method for ensuring the firewall policy will not be enabled.
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Thursday, March 5, 2015
my card#1 woes ASA 5585-X
Okay I found out whymy replacement card for slot#1 was not working.
http://socpuppet.blogspot.com.es/2015/02/i-found-out-my-ips-reloading-on-asa.html
Cisco TAC sent me the wrong card, and not once but twice.
It boils down to the RMA creation didn't read the cards model correctly;
ASA5585-SSP-IPS20
vrs
ASA-SSP-20-K8=
So now I'm relieved on what was the final issues with the card. I knew something wasn't quite right when we inspected the card in that my small daughter board that sits on the left side behind the drive bay was missing on both newly sent cards.
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( ! ! )=
o
/ \
http://socpuppet.blogspot.com.es/2015/02/i-found-out-my-ips-reloading-on-asa.html
Cisco TAC sent me the wrong card, and not once but twice.
It boils down to the RMA creation didn't read the cards model correctly;
ASA5585-SSP-IPS20
vrs
ASA-SSP-20-K8=
So now I'm relieved on what was the final issues with the card. I knew something wasn't quite right when we inspected the card in that my small daughter board that sits on the left side behind the drive bay was missing on both newly sent cards.
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( ! ! )=
o
/ \
Mobile security and discovery beaware
When you are using a open or any foreign wifi-service like at a cafe hotspot or the hotel, you could be presenting yourself for exposure by bonjour types of discovery.
Take a list of machines located at a hotel that I recently stayed at in Spain;
And here's a listing of devices found from afp-server services;
And even printers are exposed;
One thing that you need to considered, most hotSpot implementation filter ipv4 unicast to unicast traffic by isolation, but they don't so so great up a job nor should be trusted to filter ipv6. Take a simple trick of a ipv6-mlticast ping to the ALL-HOST and look at what I discovered ( ff02::1 )
Now I have a list of ipv6 hosts that I can probe or attack;
And you can check for open shares with no logins by using the link-local address of the target ;
e.g
afp:[fe80::1cbb:deef:837b:3401]
Just a few concerns that you should be aware when using the local WiFi access at that Airport/Cafe/Hotel/etc......
Now you can do some things to reduce this;
disable mDNS
ensure your local firewall is enabled
disable all services on wifi nic that would expose services
install a local end-point control application
ensure passwords for everthing ( no guest accounts )
and deploy very strong pass-phrases
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Take a list of machines located at a hotel that I recently stayed at in Spain;
And here's a listing of devices found from afp-server services;
And even printers are exposed;
One thing that you need to considered, most hotSpot implementation filter ipv4 unicast to unicast traffic by isolation, but they don't so so great up a job nor should be trusted to filter ipv6. Take a simple trick of a ipv6-mlticast ping to the ALL-HOST and look at what I discovered ( ff02::1 )
Now I have a list of ipv6 hosts that I can probe or attack;
And you can check for open shares with no logins by using the link-local address of the target ;
e.g
afp:[fe80::1cbb:deef:837b:3401]
Just a few concerns that you should be aware when using the local WiFi access at that Airport/Cafe/Hotel/etc......
Now you can do some things to reduce this;
disable mDNS
ensure your local firewall is enabled
disable all services on wifi nic that would expose services
install a local end-point control application
ensure passwords for everthing ( no guest accounts )
and deploy very strong pass-phrases
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Wednesday, March 4, 2015
GSMK cryptophone
I was at the MWC forum in Barcelona and ran across the GSMK cryptophone 500 http://www.cryptophone.de/ . Outside of thermal imaging for phones, this was the only items that I was actually looking forward to seeing & it seems very useful.
This a highly rated crypto phone for secured voice and messaging. The phone supports military grade encryption using either AES or 2fish. These phones aren't cheap, and can cost way over 2K usd. But you have to pay to have "security" and the need to protect your phone transmissions.
In the single page brochure that I picked up at GSMK booth, they stated "the keys used for each call are destroyed upon call termination ".
So this tells me the keys are setup per call and are ephemeral in usage
The local GSMK representative didn't elaborated on what this actually meant btw.
Also they where tight lip about any 3rd party evaluations, which I thought was strange and interesting to say the least. Also keep in mind you can only establish secured voice paths between 2 GSMK phones. So if your called party is not a GSMK phone, they would be out of luck in regards to security.
Stay tune , my future forecast still has me seeing mobile device security products and software becoming the new "it" in our day 2 day lives.
I believe mobile phone encryption is going to be the next "new" thing for the general end-user. This means voice, text messaging and phone security hardening. Google has already start this ( the latter ) within "Android Lollipop" and Apple is the next phone OS to included this also.
Instead of this being the "non-normal" it will become the normal and automatic or dynamic in function & operation. No different than putting on your pants or grabbing your car keys. The US gov will do all that it can to restrict, control or vociferate why they need to beable to spying on you & your communiqués, but the world is going to change and for the better and that means better protection for the johnQs of this world.
As more and more users demand this level of security for phone transmissions, than the prices for the end devices will drop as supply are up built to support the user requirements. I believe the same methods deployed for securing web and some type of public-key would be the ideal method for setting up the end2end encrypted channel for voice and text.
" think of a voice vpn if you may well "
I will leave you with this photo, a lot of China firms where pushing waterproof phones & tablets. I thought this ideal was great for the outdoor person. Or if you decide to use your phone or tablet in the pool, bath tub or while boating.
Here's one more ideal of security they have a good video on data interception by yours or foreign government https://www.seecrypt.com/
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
This a highly rated crypto phone for secured voice and messaging. The phone supports military grade encryption using either AES or 2fish. These phones aren't cheap, and can cost way over 2K usd. But you have to pay to have "security" and the need to protect your phone transmissions.
In the single page brochure that I picked up at GSMK booth, they stated "the keys used for each call are destroyed upon call termination ".
The local GSMK representative didn't elaborated on what this actually meant btw.
Also they where tight lip about any 3rd party evaluations, which I thought was strange and interesting to say the least. Also keep in mind you can only establish secured voice paths between 2 GSMK phones. So if your called party is not a GSMK phone, they would be out of luck in regards to security.
Stay tune , my future forecast still has me seeing mobile device security products and software becoming the new "it" in our day 2 day lives.
I believe mobile phone encryption is going to be the next "new" thing for the general end-user. This means voice, text messaging and phone security hardening. Google has already start this ( the latter ) within "Android Lollipop" and Apple is the next phone OS to included this also.
Instead of this being the "non-normal" it will become the normal and automatic or dynamic in function & operation. No different than putting on your pants or grabbing your car keys. The US gov will do all that it can to restrict, control or vociferate why they need to beable to spying on you & your communiqués, but the world is going to change and for the better and that means better protection for the johnQs of this world.
As more and more users demand this level of security for phone transmissions, than the prices for the end devices will drop as supply are up built to support the user requirements. I believe the same methods deployed for securing web and some type of public-key would be the ideal method for setting up the end2end encrypted channel for voice and text.
" think of a voice vpn if you may well "
I will leave you with this photo, a lot of China firms where pushing waterproof phones & tablets. I thought this ideal was great for the outdoor person. Or if you decide to use your phone or tablet in the pool, bath tub or while boating.
( yes that's a phone submerged in water )
Here's one more ideal of security they have a good video on data interception by yours or foreign government https://www.seecrypt.com/
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( * * )=
o
/ \
Subscribe to:
Posts (Atom)













.jpg)







